Podcasts about secure access

  • 77PODCASTS
  • 125EPISODES
  • 33mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jan 20, 2026LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about secure access

Latest podcast episodes about secure access

No Password Required
No Password Required Podcast Episode 68 — Rob Hughes

No Password Required

Play Episode Listen Later Jan 20, 2026 44:51


Rob Hughes — CISO at RSA and Champion of a Passwordless FutureNo Password Required Season 7:  Episode 1 - Rob HughesRob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA's Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA's products and corporate environment.Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point.  The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars.Follow Rob on LinkedIn: https://www.linkedin.com/in/robert-hughes-816067a4/Chapters: 00:00 Introduction to No Password Required01:43 Meet Rob Hughes, CISO at RSA02:05 The Role of a CISO in a Security Company05:09 Transitioning to the CISO Role08:00 The Early Days of Geek.com12:14 Launching a Startup During the Dot Com Boom14:30 The Push for a Passwordless Future18:21 Tipping Point for Passwordless Adoption20:20 Ongoing Learning in Cybersecurity26:09 Managing Stress in High-Pressure Environments33:46 The Lifestyle Polygraph Begins34:15 Career Insights in Cybersecurity36:08 Dream Cars and Personal Preferences39:58 Underrated Horror Films41:19 Creating a Cybersecurity Monster

Fellowship Hi-Crest
Revelation: Seeing Jesus Clearly. Following Him Faithfully: Secure Access 9-28-25

Fellowship Hi-Crest

Play Episode Listen Later Dec 21, 2025 26:43


Microsoft Mechanics Podcast
Replace your VPN - Global Secure Access in Microsoft Entra

Microsoft Mechanics Podcast

Play Episode Listen Later Nov 19, 2025 10:12


Connect users to on-premises resources while enforcing Conditional Access policies, including MFA, and eliminate the need for VPNs using Secure Access Service Edge with Microsoft Entra. Route authentication through Microsoft Entra before granting resource access, even within legacy on-premises systems. Boost performance with intelligent local access that keeps internal traffic local while routing only authentication to the cloud. Protect sensitive data from being uploaded to AI apps, and stop prompt injection attacks—without modifying your applications or AI models. Ashish Jain, Microsoft Entra Principal GPM, shares how to strengthen your zero trust architecture while simplifying the access experience for users.  ► QUICK LINKS: 00:00 - Secure Access Service Edge 01:12 - Conditional Access controls 01:35 - See it in action 02:21 - Windows client on same network 04:00 - Private Access - Intelligent Local Access 06:21 - Block AI file uploads 07:32 - Prompt injection attacks 09:46 - Wrap up ► Link References Check out https://aka.ms/SASEwithEntra ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

Group Practice Tech
Episode 524: Real Talk: PCT Answers: Supervision and Session Recordings -- Secure Access Without the Stress

Group Practice Tech

Play Episode Listen Later Jul 4, 2025 20:33


Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we share HIPAA savvy and practical options to securely record and share sessions for supervision. We discuss: Why session recordings need to be so secure  Common non-secure recording storage methods we see at PCT The PCT-preferred solution for storing session recordings (and why we recommend doing it this way) How to securely record and share online sessions or in-person sessions Google Workspace best practices Another (less tech-friendly) option for storage Teaching the next generation of therapists practical ways to safeguard client info Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website.

The Practical 365 Podcast
On-Premises Pain, Copilot Curiosity, and a Glimpse into Global Secure Access: Practical 365 Podcast S04E38

The Practical 365 Podcast

Play Episode Listen Later Apr 22, 2025 62:49


Steve Goodman and Paul Robichaux dissect the latest Microsoft news, focusing on the sting of rising on-premises licensing costs. The team also explores Copilot Studio and the Model Context Protocol (MCP). Plus, Steve Goodman and Bastiaan Verdonk interview Microsoft's Janice Ricketts, to unravel the complexities of Global Secure Access (GSA) and Zero Trust security.Want to stay up to date on all things Practical 365? Follow us on Twitter, Facebook, and Linkedin to stay up to date on all things Microsoft!

BlåSkjerm Brødrene
#25-01 Microsoft Entra - Global Secure Access

BlåSkjerm Brødrene

Play Episode Listen Later Jan 5, 2025 31:32


Global secure access, forkortet til GSA, er dagens tema. Et av de nyeste tilskuddene i Microsoft Entra, med sterke fokus på sikker tilgang til applikasjoner og sikker kommunikasjon for brukerneMarius, Alexander og Olav, ser på bruksområder, begrensninger og tar en kjapp tur innom lisenser. Hosted on Acast. See acast.com/privacy for more information.

Unofficial SAP on Azure podcast
#219 - The one with SSO to SAP GUI using Global Secure Access (Martin Raepple) | SAP on Azure Video Podcast

Unofficial SAP on Azure podcast

Play Episode Listen Later Nov 29, 2024 32:03


In episode 219 of our SAP on Azure video podcast we talk about about SSO to the SAP GUI using Global Secure Access. In a previous episode we already talked about using MFA with SAP GUI leveraging the SAP Secure Login Service. Today we look again at providing a seucre access from your SAP GUI to your SAP system, but this time using Microsoft Global Secure Access. For this we have Martin Raepple joining!Find all the links mentioned here: https://www.saponazurepodcast.de/episode219Reach out to us for any feedback / questions:* Robert Boban: https://www.linkedin.com/in/rboban/* Goran Condric: https://www.linkedin.com/in/gorancondric/* Holger Bruchelt: https://www.linkedin.com/in/holger-bruchelt/ #Microsoft #SAP #Azure #SAPonAzure #SAPGUI #SSO

Cisco Champion Radio
S11|E20 Digital Experience Assurance with Cisco ThousandEyes: Cloud Insights & Integration

Cisco Champion Radio

Play Episode Listen Later Sep 25, 2024 33:34


By combining the power of Cisco Networking Cloud, ThousandEyes Digital Experience Assurance, and Cisco's unmatched dataset, new innovations unlock proactive insights and automated operations across customers' entire digital ecosystem. Marko Tisler, Group Product Manager with Cisco ThousandEyes, and the Cisco Champions will discuss new digital experience assurance capabilities announced on June 4 at Cisco Live, as well as dig deeper into the now generally available Cisco Secure Access Experience Insights, powered by ThousandEyes. By integrating ThousandEyes with Secure Access, IT and security teams now have full visibility into key components of the digital experience: device, network, and application. This means that both teams can manage and remotely troubleshoot end-to-end connectivity for critical applications and services, all in a single, easy-to-understand view that enables rapid root cause identification and resolution. Resources https://www.thousandeyes.com/integrations/cisco-secure-access-experience-insights Cisco guest Marko Tisler, Group Product Manager, Cisco ThousandEyes Cisco Champion hosts Donald Robb, Principal Network Architect, The Walt Disney Company Sebastian Leuser, Solution Architect, Deutsche Telekom Geschäftskunden GmbH Liam Keegan, Advisor Moderator Danielle Carter, Customer Voices and Cisco Champion Program, Cisco

CIAOPS - Need to Know podcasts
Episode 322 - Global Secure Access

CIAOPS - Need to Know podcasts

Play Episode Listen Later Jul 6, 2024 17:07


Latest news and updates from the Microsoft Cloud. Global Secure Access pricing has been announced but not a lot of details published on this as yet, hopefully soon. Updates for both Entra and Copilot that you should take a look at. Also a great video demonstrating the use of Microsoft technology in a modern classroom. Thanks again for listening. Resources @directorcia Join my shared channel CIAOPS merch store Become a CIAOPS Patron CIAOPS Blog CIAOPS Brief CIAOPSLabs Support CIAOPS What is Global Secure access? Microsoft Entra certificate-based authentication enhancements OneNote Copilot now supports inked notes What's new in Microsoft Entra – June 2024 Intro to Config Refresh – a refreshingly new MDM feature Why AI sometimes gets it wrong — and big strides to address it More Threat Intelligence Content in MDTI, TA Enables Better Security Outcomes What's new in Copilot | June 2024 Driving Copilot for Microsoft 365 adoption with an assist from Microsoft Viva Introducing the Microsoft Entra PowerShell module Mitigating Skeleton Key, a new type of generative AI jailbreak technique A basic demo of an AI crescendo [VIDEO] Copilot for Security TI Embedded Experience in Defender XDR is now GA User insights: Analyze customer identity data How to start transforming your business with AI | AI at work with Microsoft's Jared Spataro [VIDEO] Inside UNSW's State-of-the-Art Digital Teaching Studio - Microsoft Teams Rooms

Let's Talk Azure!
S5E15 - Entra Global Secure Access - An Identity-Centric Service Service Edge

Let's Talk Azure!

Play Episode Listen Later Apr 26, 2024 52:25 Transcription Available


Alan and Sam discuss Microsoft Entra Global Secure Access. A identity-centric Security Service Edge (SSE) solution that helps secure user's internet and on-premises access. Here are a few things we covered: What is a Security Service Edge ? What is Microsoft Entra Global Secure Access? How does Entra Internet access for Microsoft 365 help secure and prevent data leakage? What is Entra Internet Access and Private Access? What did you think of this episode? Give us some feedback via our contact form, Or leave us a voice message in the bottom right corner of our site.Read transcript

Microsoft Cloud IT Pro Podcast
Episode 375 – Securing Your Digital World: An Intro to Global Secure Access

Microsoft Cloud IT Pro Podcast

Play Episode Listen Later Apr 25, 2024 37:54 Transcription Available


Welcome to Episode 375 of the Microsoft Cloud IT Pro Podcast, where we discuss Microsoft's Global Secure Access offering. We explain how Global Secure Access brings identity, network, and endpoint access together under one service and how it combines with Defender for Cloud Apps and is built around the capacity of the Microsoft WAN. Join us as we take a deep dive into the world of digital security and learn how Global Secure Access can help you secure your digital world. Like what you hear and want to support the show? Check out our membership options. Show Notes What is Global Secure Access (preview)? Global Secure Access clients Global Secure Access client for Windows (preview) Global Secure Access (preview) traffic forwarding profiles Learn about Microsoft Entra Private Access Learn about Microsoft Entra Internet Access for all apps How to use the Global Secure Access (preview) enriched Microsoft 365 logs About the sponsors Would you like to become the irreplaceable Microsoft 365 resource for your organization? Let us know!

RNZ: Morning Report
Government department pulls plug on project to give secure access to data

RNZ: Morning Report

Play Episode Listen Later Apr 3, 2024 4:33


A government department has pulled the plug on a multi-million-dollar project meant to give people more secure access to birth, death and marriage data online. Internal Affairs won't say how much money was sunk into the project central to a $150 million dollar overhaul. Phil Pennington spoke to Ingrid Hipkiss.

Uncovering Hidden Risks
Secure Access in the Era of AI

Uncovering Hidden Risks

Play Episode Listen Later Feb 21, 2024 24:11


Jef Kazimer, Microsoft's Principal Product Manager, and Bailey Bercik, Senior Product Manager, join Erica Toelle and guest host Lisa Huang-North on this week's episode of Uncovering Hidden Risks. Today's episode will focus on security in the era of cloud and AI, with insights from Microsoft Security's product team. It will encompass AI-driven security measures, data protection, identity management, and compliance in the cloud while providing valuable insights for professionals navigating the evolving landscape of cloud security and AI's influence on it. Together, they discuss the importance of basic security hygiene, the implications of sophisticated AI-based attacks, and the necessity of adopting a defense-in-depth strategy to protect against emerging threats.    In This Episode You Will Learn:       The use of generative AI in attack vectors like phishing and social engineering  Principles of zero trust and how they apply to AI systems  Challenges and opportunities for securing identity and access in 2024   Some Questions We Ask:       How can organizations leverage Microsoft's Zero Trust framework to protect their data?  What are the best practices when implementing passwordless authentication?  Are the principles of Zero Trust still relevant to this new wave of threats?     Resources:     View Lisa Huang-North on LinkedIn   View Jef Kazimer on LinkedIn   View Bailey Bercik on LinkedIn   View Erica Toelle on LinkedIn      MITRE ATLAS: MITRE | ATLAS™ Book: Not with a Bug but with a Sticker Blog Post: Demystifing LLMs and Threats. Based off of my presentation for CSA | by Caleb Sima | csima | Medium           Related Microsoft Podcasts:                     Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast    Microsoft Threat Intelligence Podcast    Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Uncovering Hidden Risks is produced by Microsoft and distributed as part of N2K media network.   

@BEERISAC: CPS/ICS Security Podcast Playlist
Ron Fabela: Secure Access That Makes Sense for Operations

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 25, 2023 52:23


Podcast: The PrOTect OT Cybersecurity Podcast (LS 31 · TOP 5% what is this?)Episode: Ron Fabela: Secure Access That Makes Sense for OperationsPub date: 2023-12-21About Ron Fabela: Ron Fabela, a seasoned cybersecurity professional with over 20 years of experience, specializes in safeguarding Industrial Control Systems (ICS) and Operations Technology (OT). Currently serving as the Field CTO at XONA, Ron leads initiatives to establish secure industrial access, ensuring safe operations for asset owners globally. With a background rooted in hands-on experience across diverse critical infrastructure sectors such as power generation, offshore oil, and refineries, he excels in overcoming industry-specific challenges and possesses a unique skill set to articulate technical and business concepts effectively to a broad audience.In this episode, Aaron and Ron Fabela discuss:Adopting secure remote access in OT as an operational requirementThe complex landscape of active scanning in ICSBuilding trust and bridging the gap between cybersecurity and OTBalancing innovation, risk, and security in a changing landscapeKey Takeaways:In the dynamic world of ICS, securing remote access is not just a cybersecurity necessity but a practical operational requirement, as witnessed through the evolution from air gaps to accepted industry practices, embracing the concept of zero trust while facilitating secure access is not only a cybersecurity feat but a collaborative effort aligning operational needs with stringent security measures.The shift from passive to active scanning is crucial for effective threat detection and asset visibility; while skepticism persists, bridging the gap between security and operations through trust-building and advocacy is essential to navigate the challenges and seize the opportunities in securing critical infrastructure.To establish trust and enhance cybersecurity in operational environments, genuine collaboration, understanding the challenges of control system engineers, and acknowledging small victories are crucial steps toward securing critical infrastructure and ensuring operational resilience.The future of industrial cybersecurity brings excitement and concern with the shift to advanced systems like cloud, edge, and virtualization, offering scalability but inheriting a substantial attack surface. This underscores the importance of a strategic security approach in this evolving landscape. "I appreciate where I'm at. That's why I stay in the community. I don't think I could ever go back to enterprise and have that same feeling of mission and importance without letting it get to you. Early on, a lot of us were like, "We're saving the world." It's like, "No, no, no. We're just trying to help people, and we're helping ourselves in the process." That's why I love the community." — Ron Fabela Connect with Ron Fabela: Email: ron@fabela.co (unofficial business) & ron@xonasystems.com (official business)LinkedIn: https://www.linkedin.com/in/ronniefabela/Twitter: https://twitter.com/ron_fabConnect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Ron Fabela: Secure Access That Makes Sense for Operations

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 25, 2023 52:23


Podcast: The PrOTect OT Cybersecurity Podcast (LS 29 · TOP 10% what is this?)Episode: Ron Fabela: Secure Access That Makes Sense for OperationsPub date: 2023-12-21About Ron Fabela: Ron Fabela, a seasoned cybersecurity professional with over 20 years of experience, specializes in safeguarding Industrial Control Systems (ICS) and Operations Technology (OT). Currently serving as the Field CTO at XONA, Ron leads initiatives to establish secure industrial access, ensuring safe operations for asset owners globally. With a background rooted in hands-on experience across diverse critical infrastructure sectors such as power generation, offshore oil, and refineries, he excels in overcoming industry-specific challenges and possesses a unique skill set to articulate technical and business concepts effectively to a broad audience.In this episode, Aaron and Ron Fabela discuss:Adopting secure remote access in OT as an operational requirementThe complex landscape of active scanning in ICSBuilding trust and bridging the gap between cybersecurity and OTBalancing innovation, risk, and security in a changing landscapeKey Takeaways:In the dynamic world of ICS, securing remote access is not just a cybersecurity necessity but a practical operational requirement, as witnessed through the evolution from air gaps to accepted industry practices, embracing the concept of zero trust while facilitating secure access is not only a cybersecurity feat but a collaborative effort aligning operational needs with stringent security measures.The shift from passive to active scanning is crucial for effective threat detection and asset visibility; while skepticism persists, bridging the gap between security and operations through trust-building and advocacy is essential to navigate the challenges and seize the opportunities in securing critical infrastructure.To establish trust and enhance cybersecurity in operational environments, genuine collaboration, understanding the challenges of control system engineers, and acknowledging small victories are crucial steps toward securing critical infrastructure and ensuring operational resilience.The future of industrial cybersecurity brings excitement and concern with the shift to advanced systems like cloud, edge, and virtualization, offering scalability but inheriting a substantial attack surface. This underscores the importance of a strategic security approach in this evolving landscape. "I appreciate where I'm at. That's why I stay in the community. I don't think I could ever go back to enterprise and have that same feeling of mission and importance without letting it get to you. Early on, a lot of us were like, "We're saving the world." It's like, "No, no, no. We're just trying to help people, and we're helping ourselves in the process." That's why I love the community." — Ron Fabela Connect with Ron Fabela: Email: ron@fabela.co (unofficial business) & ron@xonasystems.com (official business)LinkedIn: https://www.linkedin.com/in/ronniefabela/Twitter: https://twitter.com/ron_fabConnect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it. The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The PrOTect OT Cybersecurity Podcast
Ron Fabela: Secure Access That Makes Sense for Operations

The PrOTect OT Cybersecurity Podcast

Play Episode Listen Later Dec 21, 2023 52:23


About Ron Fabela: Ron Fabela, a seasoned cybersecurity professional with over 20 years of experience, specializes in safeguarding Industrial Control Systems (ICS) and Operations Technology (OT). Currently serving as the Field CTO at XONA, Ron leads initiatives to establish secure industrial access, ensuring safe operations for asset owners globally. With a background rooted in hands-on experience across diverse critical infrastructure sectors such as power generation, offshore oil, and refineries, he excels in overcoming industry-specific challenges and possesses a unique skill set to articulate technical and business concepts effectively to a broad audience.In this episode, Aaron and Ron Fabela discuss:Adopting secure remote access in OT as an operational requirementThe complex landscape of active scanning in ICSBuilding trust and bridging the gap between cybersecurity and OTBalancing innovation, risk, and security in a changing landscapeKey Takeaways:In the dynamic world of ICS, securing remote access is not just a cybersecurity necessity but a practical operational requirement, as witnessed through the evolution from air gaps to accepted industry practices, embracing the concept of zero trust while facilitating secure access is not only a cybersecurity feat but a collaborative effort aligning operational needs with stringent security measures.The shift from passive to active scanning is crucial for effective threat detection and asset visibility; while skepticism persists, bridging the gap between security and operations through trust-building and advocacy is essential to navigate the challenges and seize the opportunities in securing critical infrastructure.To establish trust and enhance cybersecurity in operational environments, genuine collaboration, understanding the challenges of control system engineers, and acknowledging small victories are crucial steps toward securing critical infrastructure and ensuring operational resilience.The future of industrial cybersecurity brings excitement and concern with the shift to advanced systems like cloud, edge, and virtualization, offering scalability but inheriting a substantial attack surface. This underscores the importance of a strategic security approach in this evolving landscape. "I appreciate where I'm at. That's why I stay in the community. I don't think I could ever go back to enterprise and have that same feeling of mission and importance without letting it get to you. Early on, a lot of us were like, "We're saving the world." It's like, "No, no, no. We're just trying to help people, and we're helping ourselves in the process." That's why I love the community." — Ron Fabela Connect with Ron Fabela: Email: ron@fabela.co (unofficial business) & ron@xonasystems.com (official business)LinkedIn: https://www.linkedin.com/in/ronniefabela/Twitter: https://twitter.com/ron_fabConnect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

Habitus Podcast
#98 - Locking the Future: Inside EVVA's World of Secure Access Control Systems

Habitus Podcast

Play Episode Listen Later Nov 17, 2023 41:51


Dive into the fascinating world of EVVA, an Austrian pioneer in secure access control systems since 1919, in our latest podcast episode. We sat down with Raphael Rey Bacolod and Sahil Joses from EVVA Austria to discuss the evolution and innovation behind their high-security products.   From robust mechanical cylinders to sophisticated electronic solutions like AirKey, EVVA blends tradition with modernity, setting new standards in security technology. We also explore their collaboration with Habitus, introducing the revolutionary concept of a single master key for all types of doors, including timber and aluminium. This episode offers invaluable insights for enthusiasts and professionals alike in the realms of architectural locks, cylinders, and overall security solutions.   For further details, explore Habitus Concept located at Jln Cideng Timur 73.

Cisco Champion Radio
S10|E28 Get More from Your SD-WAN by Extending to Secure Access Service Edge (SASE)

Cisco Champion Radio

Play Episode Listen Later Nov 7, 2023 48:11


In this episode of Cisco Champion Radio, join the Cisco Champions and expert to learn how to harness the power of SD-WAN by combining it with converged, cloud security capabilities that only a SASE architecture offers. Listen and learn to discover use cases uniquely designed to deliver anywhere connectivity, always-on cloud security, and an improved remote worker experience, from anywhere. Resources: Visit this page to learn more about Cisco's turnkey, unified SASE solution, Cisco+ Secure Connect: https://meraki.cisco.com/products/cisco-plus-secure-connect/ Cisco Guest Avinash Ramesh, Technical Marketing Engineering Technical Leader, Cisco Meraki Cisco Champion Hosts Liam Keegan (https://www.linkedin.com/in/liamjkeegan/), Solutions Architect, 24/7 Networks Pierre Besombes (https://www.linkedin.com/in/pierrebesombes/) Principal Engineer, Rakuten Tech Moderator Danielle Carter, Cisco, CCR Program/ Customer Voices

SBS World News Radio
Prime Minister announces $2 billion dollar boost to secure access to critical minerals

SBS World News Radio

Play Episode Listen Later Oct 25, 2023 5:22


Prime Minister Anthony Albanese has announced a $2 billion dollar expansion in critical minerals financing during his visit to the United States. The funds will double the capacity of the Critical Minerals Facility to finance Australian critical minerals mining and processing projects.

Trust Issues
EP 38 - Why Cloud Security Doesn't Taste Like Chicken

Trust Issues

Play Episode Listen Later Oct 19, 2023 36:19


Today's guest is Charles Chu, CyberArk's General Manager of Cloud Security, who's spent more than a decade at the forefront of cloud security. Chu joins host David Puner for a conversation that delves into secure cloud access and the concept of zero standing privileges (ZSP), a dynamic approach to securing identities in multi-cloud environments. Chu sheds light on the complexities of cloud security, emphasizing the need for tailored solutions to protect against evolving cyber threats. Don't miss this insightful conversation that demystifies cloud security and redefines safeguarding digital assets – and answers the pivotal question: Why doesn't cloud security taste like chicken?  

CiscoChat Podcast
Season 2, Episode 6 Intelligent Design, Intentional Outcomes, Jason Cyr, Sr. Dir., Security Design

CiscoChat Podcast

Play Episode Listen Later Sep 6, 2023 17:17


Jason talks to Principled about using the principles from start to finish developing Cisco's latest security solution, Cisco Secure Access. Secure Access launched with great customer enthusiasm as a result of real customer conversations and a roadmap focused on outcomes. Jason talks about the impact of the principles on the product development culture at Cisco, and how the principles may morph as AI becomes integrated into products. Key moments: 2:00 Twenty conversations with customers sets path for success for Secure Access 4:00 The little book that catalyzed change 4:40 Roadmaps focused on outcomes 7:15 Onboarding as a use case 9:58 Principles shifting the culture 11:45 Design principles for AI 14:20 The emerging discipline of design Episode transcript: https://cisco.box.com/s/4b1qov835j0dijtm7nl8lsp909hpgivj

Ctrl+Alt+Azure
201 - A peek into a secure future with Microsoft Entra Global Secure Access

Ctrl+Alt+Azure

Play Episode Listen Later Aug 30, 2023 36:48


In this episode, we talk about Microsoft Entra Global Secure Access. What is it? Why would you need it? We dissect the services and talk about the capabilities and how they map back to services we've had before. Also, Jussi asks Tobi an unexpected question.(00:00) - Intro and catching up.(05:01) - Community highlights.(06:10) - Show content starts. Community Highlights- Ronak Chokshi: Introducing a new Azure AI Language video series showcasing features powered by Azure OpenAI & more- Saul Dolgin: Introducing the Azure Business Continuity GuideShow links- What is Microsoft Entra Global Secure Access?- Give us feedback!SPONSORThis episode is sponsored by Sovelto. Stay ahead of the game and advance your career with continuous learning opportunities for Azure Cloud professionals. Sovelto Eduhouse – Learning as a Lifestyle - Start Your Journey now: https://www.eduhouse.fi/cloudpro

Let's Talk Azure!
S4E10 - Microsoft Entra - Global Secure Access First Look

Let's Talk Azure!

Play Episode Listen Later Aug 18, 2023 45:36


Alan and Sam discuss Microsoft Entra ID Global Secure Access. A feature that was announced with the rebrand of Azure AD to Microsoft Entra ID. Here are a few things we covered: What is Microsoft Entra Internet Access What is Microsoft Entra Private Access How do these features help secure access to the internet and to SaaS and internal applications? Do we know how it is licenced yet? How to add MFA and conditional access to legacy applications and protocols that are unable to support it. What did you think of this episode? Give us some feedback via our contact form, Or leave us a voice message in the bottom right corner of our site.Read transcript

Packet Pushers - Full Podcast Feed
Day Two Cloud 204: Deploying Cloud-Delivered Security With Cisco Secure Access (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jul 26, 2023 56:30


On today's Day Two Cloud we get inside Cisco Secure Access, a new set of cloud-delivered security services from Cisco. We discuss the security capabilities on offer, the service's architecture and components, how Cisco addresses concerns around user experience and performance, and more. This is a sponsored episode.

Packet Pushers - Full Podcast Feed
Day Two Cloud 204: Deploying Cloud-Delivered Security With Cisco Secure Access (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jul 26, 2023 56:30


On today's Day Two Cloud we get inside Cisco Secure Access, a new set of cloud-delivered security services from Cisco. We discuss the security capabilities on offer, the service's architecture and components, how Cisco addresses concerns around user experience and performance, and more. This is a sponsored episode. The post Day Two Cloud 204: Deploying Cloud-Delivered Security With Cisco Secure Access (Sponsored) appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
Day Two Cloud 204: Deploying Cloud-Delivered Security With Cisco Secure Access (Sponsored)

Packet Pushers - Fat Pipe

Play Episode Listen Later Jul 26, 2023 56:30


On today's Day Two Cloud we get inside Cisco Secure Access, a new set of cloud-delivered security services from Cisco. We discuss the security capabilities on offer, the service's architecture and components, how Cisco addresses concerns around user experience and performance, and more. This is a sponsored episode. The post Day Two Cloud 204: Deploying Cloud-Delivered Security With Cisco Secure Access (Sponsored) appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
Day Two Cloud 204: Deploying Cloud-Delivered Security With Cisco Secure Access (Sponsored)

Packet Pushers - Fat Pipe

Play Episode Listen Later Jul 26, 2023 56:30


On today's Day Two Cloud we get inside Cisco Secure Access, a new set of cloud-delivered security services from Cisco. We discuss the security capabilities on offer, the service's architecture and components, how Cisco addresses concerns around user experience and performance, and more. This is a sponsored episode.

Day 2 Cloud
Day Two Cloud 204: Deploying Cloud-Delivered Security With Cisco Secure Access (Sponsored)

Day 2 Cloud

Play Episode Listen Later Jul 26, 2023 56:30


On today's Day Two Cloud we get inside Cisco Secure Access, a new set of cloud-delivered security services from Cisco. We discuss the security capabilities on offer, the service's architecture and components, how Cisco addresses concerns around user experience and performance, and more. This is a sponsored episode.

Day 2 Cloud
Day Two Cloud 204: Deploying Cloud-Delivered Security With Cisco Secure Access (Sponsored)

Day 2 Cloud

Play Episode Listen Later Jul 26, 2023 56:30


On today's Day Two Cloud we get inside Cisco Secure Access, a new set of cloud-delivered security services from Cisco. We discuss the security capabilities on offer, the service's architecture and components, how Cisco addresses concerns around user experience and performance, and more. This is a sponsored episode. The post Day Two Cloud 204: Deploying Cloud-Delivered Security With Cisco Secure Access (Sponsored) appeared first on Packet Pushers.

The Full Desk Experience
Industry Spotlight | Jim Stroud - HR Influencer & Content Creator - The Pros and Cons of ChatGPT and AI in the Talent Industry

The Full Desk Experience

Play Episode Listen Later Jul 13, 2023 56:15


In this episode of "The Full Desk Experience," host Kortney Harmon is joined by guest Jim Stroud to discuss the role of AI tools in recruitment, and the importance of human interaction in the hiring process. Jim shares insights on the benefits and limitations of AI tools and Chat GPT, highlighting their usefulness in generating sourcing strategies and optimizing recruitment processes.However, they also delve into concerns such as bias, misinformation, and the need for transparency when using AI tools. This thought-provoking conversation explores the future of AI in recruitment and raises important questions about compensation, workload, and maintaining a healthy work-life balance.Key points discussed in this episode include:- Powerful tools for staffing and recruiting with diverse viewpoints from multiple sources- The role of AI tools in screening candidates and answering basic questions, while emphasizing the irreplaceable value of human interaction in executive talent recruitment- Speculation about the future of AI- The importance of addressing bias, transparency, and security when integrating AI systems into recruitment processes- Key considerations when choosing AI tools, including compatibility, reputation, customer support, and impact on candidate experience- Examples of using Chat GPT for sourcing, ranking strategies, writing persuasive emails, and generating interview questions- The need for human verification and cautions against over-reliance on AI tools without human oversight- The potential impact of AI tools on compensation and workload, calling for necessary conversations and considerations in this regard.Overall, this episode provides valuable insights into the benefits and challenges associated with AI tools in recruitment, fostering a discussion on the future of AI in the workplace and the importance of maintaining a balance between technology and human interaction.To see more of Jim's work, check out:The Recruiting Radar is a weekly newsletter of business leads for people in the business of recruiting. The Recruiting Life  is a whimsical view of the world of work that aspires to educate and entertain.  The JimStroud Podcast -  This show explores the discoveries and trends forming the future of our lives. Brain to brain communication, robot bosses, microchip implants for workers and immortality as an employee benefit are all happening now! If you want to know what's next, subscribe to this podcast. The Jim Stroud Show - The Jim Stroud Show is a YouTube series about the future of work, life and everything in between. JimStroud.com - If you want one place to keep up with all Jim does, this is it. Subscribe now. Subscribe often. 

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Ep. 37 Living on the Edge . . . the Secure Access Service Edge

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Dec 1, 2022 30:04


There was a time in American culture when “living on the edge” was a social construct. Perhaps a person was a test pilot or motorcycle racer.  In terms of federal information technology, we all live on the edge. The edge referred to is, of course, the digital edge.  The wall protecting federal data has long been breached and technologies like Zero Trust are being implemented to protect vital assets. The term Secure Access Service Edge was coined by Gartner in 2019. It was a stodgy concept at the time and then COVID hit. The millions of remote sessions were causing technology leaders to evaluate the way they handled security.  Suddenly, the acronym SASE was born, along with its unique pronunciation: “Sassy.” During the interview, Dr. Tim Robinson from WWT gives a detailed description of SASE.  He is uniquely qualified to speak to the federal audience because he was a Marine and has worked his way up to a Ph.D. in Computer Science.  A rough description may be cloud technology is being leveraged to optimize network connectivity to allow for consistent policy enforcement, centralized visibility, and scalability. It is always good to look at an emergency and, later, do a course correction. An argument can be made that COVID forced technology leaders to use Virtual Private Networks (VPNs). After all, they were available and easy to deploy. In hindsight, most can conclude that the VPN has strategic weaknesses.  It is simply not optimized for the cloud. Listen to the interview to get an expert's view on ways to increase security and reduce costs to protect federal data.             

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Sometimes, success means being at the right place at the right time. BeyondTrust has been active in the world of access control for decades. They have seventy patents and have a well-earned reputation for deep knowledge of secure remote access. Before COVID hit, BeyondTrust was strong in a niche product category; when COVID forced commercial and federal systems to drastically increase remote access, BeyondTrust was ready. When cybersecurity experts started to recommend a concept called “Zero Trust,” BeyondTrust had “trust” right in their name! BeyondTrust's Josh Brodbent works with non-profit organizations like ATARC to be able to sit on committees to listen to the needs of the federal workforce. As a result, he has seen the reasons people succeed at access control and, unfortunately, how they fail. One of his observations is that Multi-Factor Authentication may not be enough for a robust deployment of Zero Trust. Most experts would criticize MFA because it frequently relies on the public phone system to transfer code. Josh points out that, in his experience, larger organizations have so many security controls that humans can get sick of all this MFA. If you get hundreds a day you may end up with “MFA” fatigue. One innovation for BeyondTrust is a concept called “Just in time” access. When installed correctly, users can get access verification promptly because the system is structured with keeping the user happy. Another term that Josh brought up was the phrase “dynamic access.” In the past, dynamic access was designed for on-premises applications. A few rules to consider, but not many. Today, we see private clouds, public clouds, hybrid clouds – a wide range of systems that can cause a complex process like dynamic access delay response.  

ITSPmagazine | Technology. Cybersecurity. Society
Secure Access And Authorization: Keeping Precious Resources Safe From Prying Eyes And Bad Actors | A Live Stream Panel With Shinesa Cambric And John Sapp Jr | Redefining CyberSecurity With Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 19, 2022 50:37


Your organization has precious resources all over the place: on-premises in the data center on servers and in databases; in the office, at home, on the road on desktops, laptops, tablets, mobile phones, and smart devices; in the cloud inside containers, applications, and a variety of storage services. Assuming you have identified and verified the person and/or system and/or service as a valid entity, how do you ensure they only have access to these resources, when they need them, from the location they need them, from the system they are requesting them, and at the time they are requesting them? This challenge is much more complex than ensuring a user is set up in the directory and has entered a valid password. That's what this discussion is going to be all about.Join us for this session as we explore the following points:◾️ What does “secure access” mean to security, to ops, to the users, to the business?◾️ Does the conversation and language need to change between groups?◾️ How and where is secure access managed?◾️ How to deal with the systems, applications, and data?◾️ How does it fit in with Risk Management and SecOps?◾️ What are some key challenges orgs face?◾️ What are some of the core elements many orgs leave out?◾️ Are there processes and/or tools to make things easier?◾️ Any best practices or tips to simplify the program?____________________________GuestsShinesa CambricIdentity Champion at Identity Defined Security Alliance [@idsalliance] | Principal Product Manager for Emerging Identity at Microsoft [@Microsoft]On LinkedIn | https://www.linkedin.com/in/shinesa-cambric-cissp-ccsp-cisa®-0480685/On Twitter | https://twitter.com/Gleauxbalsecur1John Sapp JrVP, Information Security & CISO at Texas Mutual Insurance Company [@texasmutual]On LinkedIn | https://www.linkedin.com/johnbsappjrOn Twitter | https://www.twitter.com/czarofcyber____________________________This Episode's SponsorsImperva: https://itspm.ag/imperva277117988HITRUST: https://itspm.ag/itsphitweb____________________________ResourcesIdentify Defined Security Alliance Best Practices: https://www.idsalliance.org/identity-defined-security-framework/best-practices/Enterprise Risk - Engaging Others: https://www.isaca.org/resources/isaca-journal/issues/2020/volume-5/addressing-risk-using-the-new-enterprise-security-risk-management-cycle____________________________Catch the on-demand live stream video and podcast here: https://www.itspmagazine.com/live-panels/secure-access-and-authorization-keeping-precious-resources-safe-from-prying-eyes-and-bad-actors-redefining-cybersecurity-with-sean-martinTo see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?

Redefining CyberSecurity
Secure Access And Authorization: Keeping Precious Resources Safe From Prying Eyes And Bad Actors | A Live Stream Panel With Shinesa Cambric And John Sapp Jr | Redefining CyberSecurity With Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Apr 19, 2022 50:37


Your organization has precious resources all over the place: on-premises in the data center on servers and in databases; in the office, at home, on the road on desktops, laptops, tablets, mobile phones, and smart devices; in the cloud inside containers, applications, and a variety of storage services.Assuming you have identified and verified the person and/or system and/or service as a valid entity, how do you ensure they only have access to these resources, when they need them, from the location they need them, from the system they are requesting them, and at the time they are requesting them? This challenge is much more complex than ensuring a user is set up in the directory and has entered a valid password. That's what this discussion is going to be all about.Join us for this session as we explore the following points:◾️ What does “secure access” mean to security, to ops, to the users, to the business?◾️ Does the conversation and language need to change between groups?◾️ How and where is secure access managed?◾️ How to deal with the systems, applications, and data?◾️ How does it fit in with Risk Management and SecOps?◾️ What are some key challenges orgs face?◾️ What are some of the core elements many orgs leave out?◾️ Are there processes and/or tools to make things easier?◾️ Any best practices or tips to simplify the program?____________________________GuestsShinesa CambricIdentity Champion at Identity Defined Security Alliance [@idsalliance] | Principal Product Manager for Emerging Identity at Microsoft [@Microsoft]On LinkedIn | https://www.linkedin.com/in/shinesa-cambric-cissp-ccsp-cisa®-0480685/On Twitter | https://twitter.com/Gleauxbalsecur1John Sapp JrVP, Information Security & CISO at Texas Mutual Insurance Company [@texasmutual]On LinkedIn | https://www.linkedin.com/johnbsappjrOn Twitter | https://www.twitter.com/czarofcyber____________________________This Episode's SponsorsImperva: https://itspm.ag/imperva277117988HITRUST: https://itspm.ag/itsphitweb____________________________ResourcesIdentify Defined Security Alliance Best Practices: https://www.idsalliance.org/identity-defined-security-framework/best-practices/Enterprise Risk - Engaging Others: https://www.isaca.org/resources/isaca-journal/issues/2020/volume-5/addressing-risk-using-the-new-enterprise-security-risk-management-cycle____________________________Catch the on-demand live stream video and podcast here: https://www.itspmagazine.com/live-panels/secure-access-and-authorization-keeping-precious-resources-safe-from-prying-eyes-and-bad-actors-redefining-cybersecurity-with-sean-martinTo see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?

The Motivity Podcast with Danielle
secure data, secure access, cisco talos, technology

The Motivity Podcast with Danielle

Play Episode Listen Later Apr 1, 2022 41:48


Security is a top concern for any enterprise network. The number of IoT devices will only grow, and they are often vulnerable to hackers who want access into your systems or information - this puts you at risk!IoT: Why Is Security So Important For An Enterprise Network?The enterprise network is a very important and high-value asset for any company. That's why it should be protected with the best security measures possible, in order to avoid losing productivity or customer confidence!Subscribe to the ShowApple: https://podcasts.apple.com/us/podcast/the-motivity-podcast-with-danielle/id1597589985?itsct=podcast_box_promote_link&itscg=30200&at=1001l39b5Spotify: https://open.spotify.com/show/57SR0MxbuZgMTDwqdi3XGSTwitter Accounthttps://twitter.com/MotivityPodcastInstagram https://www.instagram.com/daniellehershman/https://www.instagram.com/motivity_podcastConnect with me on LinkedInhttps://www.linkedin.com/in/daniellehershman/

Agent of Influence
Episode 041 - What is Secure Access Service Edge (SASE) and How Has it Evolved in Recent Years? - Jason Clark & James Robinson

Agent of Influence

Play Episode Listen Later Mar 16, 2022 39:20


What is Secure Access Service Edge (SASE) and How Has it Evolved in Recent Years?In this episode of Agent of Influence, Nabil is joined by Netskope's Jason Clark, Chief Security Officer and Chief Strategy Officer, and James Robinson, Deputy Chief Information Security Officer. They discuss the evolution of secure access service edge (SASE), the acceleration of cloud adoption, zero trust network access, threat modeling, and more.

Zero Trust Thirty
Episode 5: Secure Access for Post-pandemic Hybrid Workforces

Zero Trust Thirty

Play Episode Listen Later Dec 21, 2021 44:21


Over the last two years, enterprises lived through the world's largest unplanned experiment in remote access. As we head into 2022, what did we learn and what can we expect in the year ahead? In this episode we will talk about how secure remote access has evolved since the pandemic and how organizations can align their security strategy to account for a permanently hybrid workforce.Guests: Garrett Bekker, Principal Research Analyst, 451 Research, part of S&P Global Market Intelligence; Julie Preiss, Chief Marketing Officer, AppgateModerator:George Wilkes, VP of Demand Generation, AppgateVisit www.appgate.com for more Zero Trust security resources.

The Cipher Podcast
The SASE Leader Explains Secure Access Service Edge

The Cipher Podcast

Play Episode Play 32 sec Highlight Listen Later Nov 2, 2021 29:31


The term Secure Access Service Edge (SASE) was coined in 2019 to describe an emerging security and network framework. Since then, the term has taken off with many companies marketing their solutions as part of the SASE concept.Our guest for today's episode is Nate Smolenski who is the Head of Cyber Intelligence Strategy at Netskope.  Netskope is touted as the SASE Leader. We cut through the acronym soup of the cyber world to identify how organizations benefit by implementing SASE concepts, in terms of both security and productivity. The first week of November is Netskope SASE Week. During this week, cybersecurity professionals can join a variety of free workshops and sessions led by industry experts. 

The Click-Down
Citrix Secure Private Access

The Click-Down

Play Episode Listen Later Oct 6, 2021 26:43


Secure Private Access allows you to provide secure and contextual access to all your applications and is integrated into one service. In this episode of The Click-Down, we invite Andre Leibovici, Principal Product Marketing Manager, to talk about Secure Private Access and Secure Access. Andre shares with us how Secure Private Access protects different types of applications and threats. We also talk about its contextual access and adaptive security policies as users are changing devices and locations. We walk through the demo shown during the Launchpad event and discuss exactly why and how everything is happening. With Secure Private Access, we ensure the user gets the best user experience, while also protecting all applications users need to be protected.Learn more below:Secure Private AccessFollow us on Twitter, we would love to hear from you!Ana Ruiz: @mobileruizDan Feller: @djfeller

private secure launchpad citrix secure access principal product marketing manager
iRadio's iScore
IIHA President Aaron Guli chatted to iScore about their campaign to secure access to an ice rink in Ireland

iRadio's iScore

Play Episode Listen Later Jun 20, 2021 5:46


Caradh caught up with Aaron Guli on iScore today. The President of the Irish Ice Hockey Association spoke about their frustration in not being able to agree lease terms with DKIT for the Ice Dome in Dundalk. Our GDPR privacy policy was updated on August 8, 2022. Visit acast.com/privacy for more information.

The CISO's Gambit
SASE: Secure Access Service…Endpoint?

The CISO's Gambit

Play Episode Listen Later Jun 11, 2021 25:36


The Zscaler CISO team has been hearing the same question in their day-to-day interactions: should I deploy zero trust: at the edge or at the endpoint? In this podcast, they share their perspectives on why a layered defense is critically important to protect organizations from today's threats.  SASE + EDR = “Better Together”, and the team clears up some uncertainties about things like: Is the endpoint a realistic option to base your security stack? What gaps are created if an organization focuses their security strategy exclusively around endpoints and Zero Trust? What is the ideal reference security architecture for the future given what we've seen with a company's digital transformation program?

SaaSy Thoughts Podcast
SaaSy VLOG Ep 1: 'How to secure access to large budgets in enterprise sales'

SaaSy Thoughts Podcast

Play Episode Listen Later Feb 4, 2021 11:55


Kicking the year off, Matt Cameron explains: - How to write a value proposition that gets access to the big budgets you need for creating massive customer value and blowing out your quota. - The key persona that you need to avoid as you engage in your next enterprise opp - Hint: His name is Seymour. 0:00 - 0:18 - Finding the unrealized value in your territory: Exec Agenda 0:48 - Gtmhub: Example company research and background 2:09 - 2:45 - Creating Value Proposition from OKRs 3:10 -

The Get Cyber Resilient Show
Ep 24 | Everything you wanted to know about Secure Access Service Edge (SASE) - with Mike ‘Fergo' Ferguson, Senior Sales Engineer at Netskope

The Get Cyber Resilient Show

Play Episode Listen Later Jul 21, 2020 45:23


This week Gar gets sassy (SASE) with Mike ‘Fergo' Ferguson, Senior Sales Engineer at Netskope. Mike has been an IT geek his entire life, with a passion for computers fuelled by his father who owned a cyber cafe. Mike started in IT support and contracted out in the UK before heading to the European Central Bank in Germany, then to Australia with Websense where Mike became an SME in data leak prevention before starting his role at Netskope. In a slightly more technical episode of the GCR podcast, Mike and Gar dive into everything Secure Access Service Edge, from a high level explanation SASE and its capabilities to what protections are possible within the architecture.

Azure Friday (HD) - Channel 9
Secure access to your API server using authorized IP ranges in AKS

Azure Friday (HD) - Channel 9

Play Episode Listen Later Mar 6, 2020


In Kubernetes, the API server is the central way to interact and manage the cluster. To improve cluster security in Azure Kubernetes Server, Ruchika Gupta shows Scott Hanselman how you can restrict access to the API server to a limited set of IP address ranges.[0:02:23] - DemoSecure access to the API server using authorized IP address ranges in Azure Kubernetes Service (AKS)Azure Kubernetes Service (AKS) overviewKubernetes: Getting startedCreate a free account (Azure)

Azure Friday (Audio) - Channel 9
Secure access to your API server using authorized IP ranges in AKS

Azure Friday (Audio) - Channel 9

Play Episode Listen Later Mar 6, 2020


In Kubernetes, the API server is the central way to interact and manage the cluster. To improve cluster security in Azure Kubernetes Server, Ruchika Gupta shows Scott Hanselman how you can restrict access to the API server to a limited set of IP address ranges.[0:02:23] - DemoSecure access to the API server using authorized IP address ranges in Azure Kubernetes Service (AKS)Azure Kubernetes Service (AKS) overviewKubernetes: Getting startedCreate a free account (Azure)